{"id":237590,"date":"2017-08-24T04:49:16","date_gmt":"2017-08-24T08:49:16","guid":{"rendered":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/exclusive-nsa-whistleblower-russia-hack-of-dnc-server-an-outright-lie-breitbart-news.php"},"modified":"2017-08-24T04:49:16","modified_gmt":"2017-08-24T08:49:16","slug":"exclusive-nsa-whistleblower-russia-hack-of-dnc-server-an-outright-lie-breitbart-news","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/exclusive-nsa-whistleblower-russia-hack-of-dnc-server-an-outright-lie-breitbart-news.php","title":{"rendered":"EXCLUSIVE  NSA Whistleblower: Russia &#8216;Hack&#8217; of DNC Server an &#8216;Outright Lie&#8217; &#8211; Breitbart News"},"content":{"rendered":"<p><p>    Utilizing recently unlocked information from data that    purportedly originated on the DNCs servers, Binney claimed    that he is something like 99% sure that the DNC servers were    not hacked from the outside. He urged the U.S. Intelligence    Community to immediately release any evidence utilized to draw    the conclusion that Russia may have been associated with the    breach of the DNC servers.  <\/p>\n<p>    Binney was an architect of the NSAs surveillance program. He    is a former NSA technical director who helped to modernize the    agencys worldwide eavesdropping network, co-founding a unit on    automating NSA signals intelligence. He became a famed    whistleblower when he resigned on October 31, 2001, after    spending more than 30 years with the agency.  <\/p>\n<p>    He is also a senior leader of Veteran Intelligence    Professionals for Sanity (VIPS), a group of former officers of    the United States Intelligence Community founded in 2003.    During the interview, Binney repeatedly referred to a forensic    analysis conducted by VIPS members on DNC files posted online    by the hacker known as Guccifer 2.0. The VIPS analysis    highlighted data that purportedly indicated the DNC server was    most likely not hacked from the outside.  <\/p>\n<p>    Binneys findings are not without detractors, however, with    some experts saying the VIPS report is flawed and ignores other    explanations for the metadata. Binney pushed back against the    criticism, charging the detractors have no evidence for their    claims. He squarely placed the onus on the U.S. government to    prove any hack.  <\/p>\n<p>    He was speaking on this reporters Sunday radio program,    Aaron    Klein Investigative Radio, broadcast on New Yorks AM 970    The Answer and Philadelphias NewsTalk 990 AM.  <\/p>\n<p>    The VIPS analysis was made possible after an independent    researcher who goes by the online name of Forensicator found a    way to unlock metadata from Guccifer 2.0s files.  <\/p>\n<p>    The unlocked metadata shows that on July 5, 2016 a total of    1,976 megabytes of data were quickly downloaded into a file. A    key finding is that the file downloads took only 87 seconds in    total, which suggests a transfer rate of 22.7 megabytes per    second.  <\/p>\n<p>    A hack of the DNC server would have most likely used an    Internet service provider. However, the analysts noted, in    mid-2016 U.S. Internet service providers for residential    clients did not have speeds capable of downloading data at that    rate. The data upload is     consistent with a regular transfer to a flash device like a    thumb drive.  <\/p>\n<p>    Yet, the VIPS report seemingly     overlooked the fact that some corporate and cloud networks    do have upload rates technically capable of transferring at    that speed. The DNC has not commented on its own network    speeds.  <\/p>\n<p>    Speaking to this reporter, Binney stated, It is almost    absolutely not possible to do it from outside. I mean you have    to have some access to the DNC network and some access from    there that would allow you to take that rate in. That meant you    had to be on the DNC network or some very high-speed network    connected to it.  <\/p>\n<p>    Binney stated that if the data were transferred via the    Internet, outside entities would have recordings of the    transfer. The network managers would monitor the network log    for the Internet, for example, he said. Basically, the people    who manage the fiber optic lines. Like AT&T. If they saw a    bulge in traffic being passed down one line they could see that    maybe we need to offload to another line and reroute. Its like    load-leveling across the entire network to make sure that it    functions and it doesnt go down for being overloaded on one    line only.  <\/p>\n<p>    Binney, who helped build the NSAs surveillance program,    alleged that the NSA would have picked up on any outside hack    of the DNC.  <\/p>\n<p>    They would know exactly where the package went if it were    transferred. I would also add that, on the other end, NSA and    GCHQ (Government Communications Headquarters), the British    equivalent, are watching [WikiLeaks founder] Julian Assange in    the embassy and all of the people who are related to him or are    contacting him or having any kind of data transfer to or from    him.  <\/p>\n<p>    Theyre watching them all  thats Wikileaks, basically  they    are watching them 24 hours a day cast iron. So, if anybody    passed data to them across the network they would know. And be    reporting it. Thats the whole problem. They didnt come out    and say here is where the data came from that came to    Wikileaks. And he is where it came from  the DNC server to    that point that is related to Wikileaks.  <\/p>\n<p>    The Hill, however,     quoted experts saying the VIP report overlooked other    scenarios that could explain the quick transfer rate. This    theory assumes that the hacker downloaded the files to a    computer and then leaked it from that computer, Rich Barger,    director of security research at Splunk, told the    publication.  <\/p>\n<p>    The Hill report continued:  <\/p>\n<p>    But, said Barger and other experts, that overlooks the    possibility the files were copied multiple times before being    released, something that may be more probable than not in a    bureaucracy like Russian intelligence.  <\/p>\n<p>    A hacker might have downloaded it to one computer, then shared    it by USB to an air gapped [off the internet] network for    translation, then copied by a different person for analysis,    then brought a new USB to an entirely different air gapped    computer to determine a strategy all before it was packaged for    Guccifer 2.0 to leak, said Barger.  <\/p>\n<p>    Speaking to this reporter, Binney allowed that the files may    have been copied multiple times before being posted by Guccifer    2.0. But he stated there is no proof that that was the case one    way or the other. We should never infer anything without at    least one fact to indicate its true, he    replied.I would say again, if anything happened    like these suggested events then NSA would have a trace on at    least most of it. They have produced no information at all.  <\/p>\n<p>    Besides the rate of transfer, here are some other findings from    the unlock metadata included in the VIPS report:  <\/p>\n<p>      The July date, however, is actually months after the DNC            said they first registered a breach in April.Binney      stated that it was possible the date and timestamp could      have been changed.    <\/p>\n<p>      The Nation related that possibility in a 4,500-word      story on the VIPS analysis:    <\/p>\n<p>      In addition, there is the adulteration of the documents      Guccifer 2.0 posted on June 15, when he made his first      appearance. This came to light when researchers penetrated      what Folden calls Guccifers top layer of metadata and      analyzed what was in the layers beneath. They found that the      first five files Guccifer made public had each been run, via      ordinary cut-and-paste, through a single template that      effectively immersed them in what could plausibly be cast as      Russian fingerprints. They were not: The Russian markings      were artificially inserted prior to posting. Its clear,      another forensics investigator self-identified as HET, wrote      in a report on this question, that metadata was deliberately      altered and documents were deliberately pasted into a      Russianified Word document with Russian language settings and      style headings.    <\/p>\n<p>    The magazine points out that the CIAs cyber-tools would have    allowed such an encoding. WikiLeaks began to release in March    and labeled Vault 7 includes one called Marble that is capable    of obfuscating the origin of documents in false-flag operations    and leaving markings that point to whatever the CIA wants to    point to.  <\/p>\n<p>    The Nation story on the VIPS report is reportedly    being reviewed by the publication. Were doing the review as    we speak, and I dont want to rush to say anything, Katrina    vanden Heuvel, the Nations editor and publisher,        told the Washington Post earlier this month. The    Post reported that the Nations review will    include the technical feasibility of the article detailing the    VIPS report.  <\/p>\n<p>    The Gufficer 2.0 files are a key part of the Russia hacking    narrative. AJanuary 6, 2017 U.S. Intelligence    Communityreport    alleging Russian government interference in the 2016    presidential campaign states this of the Gufficer 2.0 files:  <\/p>\n<p>    We assess with high confidence that Russian military    intelligence (General Staff Main Intelligence Directorate or    GRU) used the Guccifer 2.0 persona and DCLeaks.com to release    US victim data obtained in cyber operations publicly and in    exclusives to media outlets and relayed material to WikiLeaks.  <\/p>\n<p>    The U.S. Intelligence Community has not publicly released any    evidence to back up its charges. Despite false media    characterizations of 17 intelligence agencies, the January 6    report was authored by three U.S. agencies  the NSA, the FBI    and the CIA.TheWashington Post,in    its extensive June 23article,    reported on details of the compartmentalized operation that    indicates a high degree of secrecy involving top Obama    administration officials.  <\/p>\n<p>    A Bloomberg opinion piece by Leonid Bershidsky     asserted that Binneys information should get more    attention.  <\/p>\n<p>    Bershidsky wrote:  <\/p>\n<p>    Unlike the current and former intelligence officials    anonymously quoted in stories about the Trump-Russia scandal,    VIPS members actually have names. But their findings and doubts    are only being aired    bynon-mainstreampublicationsthat are easy to    accuse of being channels for Russian disinformation. The    Nation, Consortium News, ZeroHedge    and other outlets have pointed totheir findings that at    least some of the DNC files were taken by an insider rather    than by hackers, Russian or otherwise.  <\/p>\n<p>    In response to the Nation report, the DNC released the    following statement:  <\/p>\n<p>    U.S. intelligence agencies have concluded the Russian    government hacked the DNC in an attempt to interfere in the    election. Any suggestion otherwise is false and is just another    conspiracy theory like those pushed by Trump and his    administration. Its unfortunate that the Nation has    decided to join the conspiracy theorists to push this    narrative.  <\/p>\n<p>    During the radio interview, Binney pushed back against the DNC    conspiracy theory charge.  <\/p>\n<p>    They are joining the lie, Binney stated. I mean, it is an    outright lie. All they are saying is they are claiming    something. Where is any substance from anybody to prove any of    that? There isnt any. They havent given any proof    whatsoever.  <\/p>\n<p>    The intelligence community has said it is highly likely. Well,    they should absolutely know with all of the taps they have on    the fiber lines in the U.S. and around the world. They should    have no question whatsoever. Saying high confidence  that    means that they dont know. Thats really what they are saying.    If they have anything else to say, let them produce any    evidence that they have so that we can all look at it. So far,    they have produced nothing but opinion and speculation and a    lie to keep this Cold War going.  <\/p>\n<p>    In a move that has raised eyebrows, the DNC did not allow the    FBI to inspect its servers.  <\/p>\n<p>    In Januarytestimonybefore    the Senate Intelligence Committee, then-FBI Director James    Comey confirmed that the FBI registered multiple requests at    different levels to review the DNCs hacked servers.    Ultimately, the DNC and FBI came to an agreement in which a    highly respected private company would carry out forensics on    the servers and share any information that it discovered with    the FBI, Comey testified.  <\/p>\n<p>    A senior law enforcement officialstressedthe    importance of the FBI gaining direct access to the servers, a    request that was denied by the DNC.  <\/p>\n<p>    The FBI repeatedly stressed to DNC officials the necessity of    obtaining direct access to servers and data, only to be    rebuffed until well after the initial compromise had been    mitigated, the official was quoted by the news media as    saying.  <\/p>\n<p>    This left the FBI no choice but to rely upon a third party for    information. These actions caused significant delays and    inhibited the FBI from addressing the intrusion earlier.  <\/p>\n<p>    Comeys statement about a highly respected private company    gaining access to the DNC servers was a reference to    CrowdStrike, the third-party company ultimately relied upon by    the FBI to make its assessment about alleged Russian hacking    into the DNC.  <\/p>\n<p>    As this reporterdocumented,    CrowdStrike was financed to the tune of $100 millionfrom    a funding drive last year led by Google Capital.  <\/p>\n<p>    Google Capital, which now goes by the name of CapitalG, is an    arm of Alphabet Inc., Googles parent company. Eric Schmidt,    the chairman of Alphabet, has been a staunch and active    supporter of Hillary Clinton and is a longtime donor to the    Democratic Party.  <\/p>\n<p>        CrowdStrikeis a California-based cybersecurity    technology company co-founded by experts George Kurtz and    Dmitri Alperovitch.  <\/p>\n<p>    Alperovitch is anonresident    seniorfellow of the Cyber Statecraft Initiative at    the Atlantic Council. The Council takes a hawkish approach    toward Russia and has releasednumerous    reportsand briefs about Russian aggression.  <\/p>\n<p>    The Council isfundedby    the Rockefeller Brothers Fund, Inc., the U.S. State Department    and NATO ACT.  <\/p>\n<p>    Another Councilfunderis    the Ploughshares Fund, which in turn has received financing    from billionaire George Soros Open Society Foundations.  <\/p>\n<p>    Aaron Klein is Breitbarts Jerusalem bureau    chief and senior investigative reporter. He is a New York Times    bestselling author and hosts the popular weekend talk radio    program, Aaron    Klein Investigative Radio. Follow him    onTwitter    @AaronKleinShow.Follow    him onFacebook.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Continue reading here:<\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"http:\/\/www.breitbart.com\/jerusalem\/2017\/08\/23\/exclusive-nsa-whistleblower-russia-hack-dnc-server-outright-lie\/\" title=\"EXCLUSIVE  NSA Whistleblower: Russia 'Hack' of DNC Server an 'Outright Lie' - Breitbart News\">EXCLUSIVE  NSA Whistleblower: Russia 'Hack' of DNC Server an 'Outright Lie' - Breitbart News<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Utilizing recently unlocked information from data that purportedly originated on the DNCs servers, Binney claimed that he is something like 99% sure that the DNC servers were not hacked from the outside. He urged the U.S <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/exclusive-nsa-whistleblower-russia-hack-of-dnc-server-an-outright-lie-breitbart-news.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[261463],"tags":[],"class_list":["post-237590","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/237590"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=237590"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/237590\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=237590"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=237590"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=237590"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}